3.6

CVE-2005-4618

Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer.  NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version2.6.0
LinuxLinux Kernel Version2.6.0 Updatetest1
LinuxLinux Kernel Version2.6.0 Updatetest10
LinuxLinux Kernel Version2.6.0 Updatetest11
LinuxLinux Kernel Version2.6.0 Updatetest2
LinuxLinux Kernel Version2.6.0 Updatetest3
LinuxLinux Kernel Version2.6.0 Updatetest4
LinuxLinux Kernel Version2.6.0 Updatetest5
LinuxLinux Kernel Version2.6.0 Updatetest6
LinuxLinux Kernel Version2.6.0 Updatetest7
LinuxLinux Kernel Version2.6.0 Updatetest8
LinuxLinux Kernel Version2.6.0 Updatetest9
LinuxLinux Kernel Version2.6.1
LinuxLinux Kernel Version2.6.1 Updaterc1
LinuxLinux Kernel Version2.6.1 Updaterc2
LinuxLinux Kernel Version2.6.2
LinuxLinux Kernel Version2.6.3
LinuxLinux Kernel Version2.6.4
LinuxLinux Kernel Version2.6.5
LinuxLinux Kernel Version2.6.6
LinuxLinux Kernel Version2.6.6 Updaterc1
LinuxLinux Kernel Version2.6.7
LinuxLinux Kernel Version2.6.7 Updaterc1
LinuxLinux Kernel Version2.6.8
LinuxLinux Kernel Version2.6.8 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc2
LinuxLinux Kernel Version2.6.8 Updaterc3
LinuxLinux Kernel Version2.6.9 Update2.6.20
LinuxLinux Kernel Version2.6.10
LinuxLinux Kernel Version2.6.10 Updaterc2
LinuxLinux Kernel Version2.6.11
LinuxLinux Kernel Version2.6.11 Updaterc2
LinuxLinux Kernel Version2.6.11 Updaterc3
LinuxLinux Kernel Version2.6.11 Updaterc4
LinuxLinux Kernel Version2.6.11.5
LinuxLinux Kernel Version2.6.11.6
LinuxLinux Kernel Version2.6.11.7
LinuxLinux Kernel Version2.6.11.8
LinuxLinux Kernel Version2.6.11.11
LinuxLinux Kernel Version2.6.11.12
LinuxLinux Kernel Version2.6.12 Updaterc1
LinuxLinux Kernel Version2.6.12 Updaterc4
LinuxLinux Kernel Version2.6.12 Updaterc5
LinuxLinux Kernel Version2.6.12.1
LinuxLinux Kernel Version2.6.12.2
LinuxLinux Kernel Version2.6.12.3
LinuxLinux Kernel Version2.6.12.4
LinuxLinux Kernel Version2.6.12.5
LinuxLinux Kernel Version2.6.12.6
LinuxLinux Kernel Version2.6.13
LinuxLinux Kernel Version2.6.13 Updaterc1
LinuxLinux Kernel Version2.6.13 Updaterc4
LinuxLinux Kernel Version2.6.13 Updaterc6
LinuxLinux Kernel Version2.6.13 Updaterc7
LinuxLinux Kernel Version2.6.13.1
LinuxLinux Kernel Version2.6.13.2
LinuxLinux Kernel Version2.6.13.3
LinuxLinux Kernel Version2.6.13.4
LinuxLinux Kernel Version2.6.14
LinuxLinux Kernel Version2.6.14 Updaterc1
LinuxLinux Kernel Version2.6.14 Updaterc2
LinuxLinux Kernel Version2.6.14 Updaterc3
LinuxLinux Kernel Version2.6.14 Updaterc4
LinuxLinux Kernel Version2.6.14.1
LinuxLinux Kernel Version2.6.14.2
LinuxLinux Kernel Version2.6.14.3
LinuxLinux Kernel Version2.6.14.4
LinuxLinux Kernel Version2.6.14.5
LinuxLinux Kernel Version2.6.15
LinuxLinux Kernel Version2.6.15 Updaterc1
LinuxLinux Kernel Version2.6.15 Updaterc3
LinuxLinux Kernel Version2.6_test9_cvs
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.305
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.6 3.9 4.9
AV:L/AC:L/Au:N/C:N/I:P/A:P